Описание
Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.23 (включая)
cpe:2.3:a:jenkins:junit:*:*:*:*:*:jenkins:*:*
EPSS
Процентиль: 35%
0.00142
Низкий
8.3 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-611
Связанные уязвимости
CVSS3: 7.1
redhat
около 8 лет назад
Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
CVSS3: 8.3
github
больше 3 лет назад
Improper Restriction of XML External Entity Reference in Jenkins JUnit Plugin
EPSS
Процентиль: 35%
0.00142
Низкий
8.3 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-611